2021. 12. 16. 09:05 WorkHolic
Apache Log4j 1.2.x 버전 취약점 해결 방법
Apache Log4j 1.2.x 버전 취약점 해결 방법
While not affected by the exact same log4shell issue, the apache log4j team recommends to remove JMSAppender and SocketServer, which has a vulnerability in CVE-2019-17571, from your jar files.
You can use the zip command to remove the affected classes, replace the filename/version with yours:
zip -d log4j-1.2.16.jar org/apache/log4j/net/JMSAppender.class zip -d log4j-1.2.16.jar org/apache/log4j/net/SocketServer.class
You can look through through the files in your zip using less and grep,
e.g. less log4j-1.2.16.jar | grep JMSAppenderThat being said, Apache recommends that you upgrade to the 2.x version if possible. According to their security page:
Please note that Log4j 1.x has reached end of life and is no longer supported. Vulnerabilities reported after August 2015 against Log4j 1.x were not checked and will not be fixed. Users should upgrade to Log4j 2 to obtain security fixes.
#log4j-vulnerability
'WorkHolic' 카테고리의 다른 글
Log4shell 첫 발생 외 (0) | 2021.12.16 |
---|---|
Apache Log4j 1.2.x 버전 취약점 해결 방법 #2 (0) | 2021.12.16 |
SELinux 설정 (0) | 2021.12.10 |
MySQL Proxy (0) | 2021.11.10 |
403 4.7.0 TLS handshake failed (Sendmail) 해결하기 (0) | 2021.10.13 |